General

  • Target

    3004-54-0x0000000000220000-0x0000000000250000-memory.dmp

  • Size

    192KB

  • MD5

    e32298d461fa5bf348bd36358d8eaa5f

  • SHA1

    eb6d84dabe33d9b1c07614b298ec884b477a6330

  • SHA256

    9fd953b646489e95a79b1deb7936e89c52eca943c99722e7b9f985a50c449b1d

  • SHA512

    7354d1abca4c6fca18fbeb91c56860093f83f2f56fc1c21c033293526a30fb628268866aa92ab0a6d29458dc21b238f64bf4694bc59ee190d977ddb26d8525a7

  • SSDEEP

    1536:RI3qDrnv36sv0W7ToK64rH1dXhQLnuVIg9BHixNNVYQbxbuwH3oKd1z50GkRK8eL:eQ7dlhdCLnKLBHixN0I3441z5l8e8he

Malware Config

Extracted

Family

redline

Botnet

@salamalexus55rus

C2

vikaneleneer.shop:80

Attributes
  • auth_value

    c53202fcbffd00597ecbbd70ebe4d497

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3004-54-0x0000000000220000-0x0000000000250000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections